Home | Amazing | Today | Tags | Publishers | Years | Search 
OS X Mountain Lion Pocket Guide
OS X Mountain Lion Pocket Guide
OS X was first released to the public over a decade ago as Mac OS X Beta (code-named Kodiak). The decade after that saw Mac OS X go from an interesting oddity unsuited to daily work to a usable operating system with little third-party support to everything most people want out of an operating system and a...
Beginning iOS Game Development (Wrox Programmer to Programmer)
Beginning iOS Game Development (Wrox Programmer to Programmer)
IOS DEVICES PROVIDE DEVELOPERS with a unique and exciting platform for making games. The iPhone gives gamers a tiny computer in their pocket that they have with them all the time. The iPad provides a similar gameplay experience but with a larger screen, more processing power, and more memory. The devices allow for unique control...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
High Performance MySQL: Optimization, Backups, and Replication
High Performance MySQL: Optimization, Backups, and Replication
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.

The second edition of
...
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Fluid Mechanics and Thermodynamics of Turbomachinery, Fifth Edition
Fluid Mechanics and Thermodynamics of Turbomachinery, Fifth Edition
Several modifications have been incorporated into the text in the light of recent advances in some aspects of the subject. Further information on the interesting phenomenon of cavitation has been included and a new section on the optimum design of a pump inlet together with a worked example have been added which take into account...
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Discovering Computers FUNDAMENTALS Your Interactive Guide to the Digital World
Discovering Computers FUNDAMENTALS Your Interactive Guide to the Digital World
The Shelly Cashman Series® offers the fi nest textbooks in computer education. This book is our answer to the many requests we have received from instructors and students for a textbook that provides a succinct, yet thorough, introduction to computers.

In Discovering Computers —
...
Beginning Android Tablet Games Programming (Beginning Apress)
Beginning Android Tablet Games Programming (Beginning Apress)
This book teaches you to create your own games for Android 3.0 tablets. After reading and working through its examples, you’ll have gained command over the sensors, touchscreen, network capabilities, and processing power of the many new tablet computers. Does that sound daunting? It isn’t. Instead of going through the...
HTML5 Canvas Cookbook
HTML5 Canvas Cookbook

The HTML5 canvas is revolutionizing graphics and visualizations on the Web. Powered by JavaScript, the HTML5 Canvas API enables web developers to create visualizations and animations right in the browser without Flash. Although the HTML5 Canvas is quickly becoming the standard for online graphics and interactivity, many developers fail...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy